4.1 Vulnerabilities and Exposures4.1.1 Vulnerabilities4.1.2 Exposures4.1.3 Exposed Industries4.2 Human Vulnerabilities4.2.1 Human Factor of Security4.2.2 Sympathy and Compassion4.2.3 Urgency and Persuasion4.2.4 Desperation and Confusion4.2.5 Loyalty, Honesty, and Respect4.2.6 Anger and Grief4.2.7 Fear, Worry, and Anxiety4.3 Technical and Operational Vulnerabilities4.3.1 Expired Security Systems4.3.2 Obsolete Operating Systems (OS) and Utilities4.3.3 Capacity Gap4.3.4 Misplaced Priorities4.3.5 Disrupted Procedures4.3.6 Administrative Loopholes4.3.7 Network and Connectivity Exposures4.4 Cyber Threats and Exploits4.4.1 Cyber Threats4.4.2 Perspective of the Digital Threat [27]4.4.3 Threats to Healthcare Data4.4.4 Cyber Exploits4.4.5 Malware4.4.6 Ransomware4.4.7 Computer Virus4.4.8 Adware and Spyware4.4.9 Computer Worm4.4.10 Trojan Horse4.4.11 Logic Bomb4.4.12 Spear Phishing4.4.13 Man-in-the-Middle Attack4.4.14 Cyber Espionage4.4.15 Cyber Bullying4.4.16 Social Engineering 4.4.16.1 Lessons from the Twitter incident4.4.17 Password Abuse4.4.18 DDoS Attack4.4.19 Fake Website4.4.20 Website Hijack4.4.21 Insider Collusion4.5 Cybersecurity Impacts Of COVID-194.5.1 Identity Theft4.5.2 Privacy Issues4.5.3 Data Accessibility Issues4.5.4 Data Loss4.5.5 Reputation Damage4.5.6 Revenue Loss4.5.7 Service Disruption for Organizations4.5.8 Service Disruption for Individuals4.5.9 Crime Escalation4.5.10 Fatality4.6 Chapter SummaryReferences